spikeroot@home:~$

  • (Reverse - imaginaryCTF 2023) Sheepish

    TL;DR: Obfuscated Python code using lambda-calculus. Description: Mary had a flagchecker, its fleece was white as snow. Introduction We are given a Python script, consisting in a single line of ~26k characters, with lots of lambda-functions. The full script is available here , see the beginning and the end of...

  • (Reverse - Grey Cat The Flag 2023 Quals) Crackme1

    TL;DR: A challenge with obfuscated JavaScript, with some WebGL shaders to reverse. Description: When the correct key is entered, you will see a nice image. When we open the webpage, we can first inspect the HTML code. <body> <canvas id="c"></canvas> <div class="input-container"> <input id="textInput" type="text" placeholder="Enter Key"> <button id="submitButton" class="submit-button">Submit</button>...

  • (Forensics - CTF Root-Me 10k) Wack

    In this challenge, we are given a network capture of some USB traffic. We need then to find what kind of device is sending the data captured. We can remark that the length of the data packets transmitted is exactly 10. First (obvious) ideas : it is a mouse, or...